Professional Documents
Culture Documents
DATABASE SECURITY
LESSON OBJECTIVES
• Define the terms “database security” and “database risk assessment”
• List and explain types/methods of data security control
• Explain the term “access control”
• List various access control methods in database security
• State the importance of securing data
• State the role of a database administrator in securing data
DEFINITION OF TERMS
• Data Security is the practice of keeping data protected from corruption and
unauthorized access. The focus behind data security is to ensure privacy while
protecting personal or corporate data.
• Auditing:
Database auditing involves observing a database so as to be aware of the actions of
database users for security purposes, for example, to ensure that those without the
permission to access information do not access it.
• Authentication:
It is the validation control that allows you to log into a system, email or blog account
etc. Once logged in, you have various privileges until logging out.
• Encryption:
This security mechanism uses mathematical scheme and algorithms to scramble
data into unreadable text. It can only be decoded or decrypted by the party that
possesses the associated key.
• Back up:
This is the process of making copy and archiving of computer data in the event of
data loss which is used to restore the original data.
• Password:
This is sequence of secret characters used to enable access to a file, program,
computer system or other resource.
ACCESS CONTROL
Access control is a mechanism put in place to allow users have different levels of access
to the database. Access control can also be defined as a process that allows users to have
resources that they are authorized to use.